The Biggest Hacks of 2020

June 02, 2020


While the world is struggling to get a grip over one of the most advanced pandemics, cyberattackers arenโ€™t going anywhere. ๐‚๐ก๐ž๐œ๐ค ๐จ๐ฎ๐ญ ๐ฌ๐จ๐ฆ๐ž ๐จ๐Ÿ ๐ญ๐ก๐ž ๐›๐ข๐ ๐ ๐ž๐ฌ๐ญ ๐ก๐š๐œ๐ค๐ฌ ๐š๐ง๐ ๐๐š๐ญ๐š ๐›๐ซ๐ž๐š๐œ๐ก๐ž๐ฌ ๐จ๐Ÿ ๐Ÿ๐ŸŽ๐Ÿ๐ŸŽ:


In January, Microsoft discloses security breach of customer support database, contained in roughly 250 million entries.


US cannabis users

In the same month, researchers found a leaky AWS bucket exposed online that contained the personally identifiable information of 30,000 individuals linked to the medical and recreational marijuana.


Estรฉe Lauder

In February, Estรฉe Lauder exposed 440 million internal records in a security breach. The hacked database contained 440,336,852 records including internal company emails.



In March, T-Mobile revealed a security incident in which cyber attackers were able to successfully infiltrate the firm’s email services, leading to the compromise of T-Mobile customer and employee information.



A total of 5.2 million hotel guests were impacted by a data breach in March.



Japanese gaming company Nintendo confirmed today that hackers gained unauthorized access to around 160,000 user accounts since the start of the month.



ย On May 19, budget airline EasyJet said that information belonging to nine million customers may have been exposed, including over 2,200 credit card records, following a cyberattack. EasyJet is now facing an ยฃ18 billion class-action lawsuit due to the incident.ย 



For more information take a look at ZDNet new article. Also, you can visit our blog for the latest news and insights on cybersecurity:


Two significant zero-day vulnerabilities for iOS users

Two zero-day vulnerabilities were found by ZecOps startup enabling successful remote attacks on iOS users with devices running iOS 6 or above. For more information check this article.


Phishing โ€“ The story about the Phish, the Whale and the Spear

Phishing, spear phishing, and whaling attacks share many similarities โ€“ all involve using impersonation to elicit information or money from a given target. However, there are a few differences,ย find them here.


Non-Malware or Fileless Attack, In A Nutshell

Non-Malware or Fileless Attack can destabilize your organizationโ€™s network using existing applications, protocols or software to gain access into your network. Find outย what is fileless attack and how do you protect against it.


Protection Against COVID-19 Malicious Campaigns and Malware

Adversaries are targeting individuals across all the industries with treacherous campaigns and attack categories. Some of the most common campaigns include these.



Stay Safeย withย TrustNet!